sensitive data

www.techdirt.com

The US Patriot Act has suddenly scared an entire nation, and it's not the US itself this time. The Netherlands is currently going nuts about the US government being able to request medical details of all its citizens when the Dutch Electronic Patient Database (EPD) is implemented next month. This...

thenextweb.com

Worried that Apple may be able to store sensitive queries and potential company secrets, IBM has put the kibosh on the use of Siri on its networks, Wired reports. IBM CIO Jeanette Horan confirmed that Big Blue had imposed the restriction, telling the publication that the company “worries that the spoken...

www.bgr.com

Natural gas pipeline operators in the United States have reportedly been the target of sophisticated phishing attacks since last year, and the Department of Homeland Security has been helping firms deal with incidents since March. “DHS’s Industrial Control Systems Cyber Emergency Response Team has been working since March 2012...

www.betabeat.com

Ms. Perdomo (via meetup.com) Password management app Dashlane is now ready for prime time, emerging from an invite-only beta phase preceded by super-secret stealth mode. And they’d like to pitch you on a solution for your no-good, very bad password practices. When Betabeat last spoke to Dashlane back in September,...

nakedsecurity.sophos.com

A popular Firefox add-on appears to have started leaking private information about every website that users visit, including sensitive data which could identify individuals or reduce their security to a third-party server....

readwrite.com

Guest author Christian Buckley is product evangelism director at Axceler, a designer of collaboration solutions. Users have wrested more control from the information technology department than ever before. Now that they have become tech-savvy in their off-hours, they're demanding work products with the same degree of usability as their...

arstechnica.com

Aurich Lawson In the 1990s, client-server was king. The processing power of PCs and the increasing speed of networks led to more and more desktop applications, often plugging into backend middleware and corporate data sources. But those applications, and the PCs they ran on, were vulnerable to viruses and...

Comments on 'Mobile app security: Always keep the back door locked':

www.businessinsider.com

Good news for folks who regularly find themselves mashing control+alt+delete until their fingernails hurt: Researchers at the University College London have invented a new "systemic" computer that automatically repairs corrupted data whenever it appears. In non-geek speak, all that means is that this gilded, Platonic ideal of desktop PCs never,...

www.electronista.com

Note-taking app Evernote has been attacked by hackers, in the latest in a long line of digital break-ins. The company has been forced to reset all passwords for its near-50 million users after sensitive data was pulled from servers by parties unknown, including usernames, account e-mail addresses, and encrypted passwords.......

venturebeat.com

Cyber criminals hacked into computers of the White House Military Office, the White House told Politico today. The breach is said to come from attackers in China. The White House confirmed the hack on Sunday, after Republican publication The Washington Free Beacon posted rumors of the incident. According to...

Comments on 'White House admits systems in Military Office were hacked':

www.guardian.co.uk

Women-only social network Luluvise lets its members rate the men they've dated – but should they be posting personal sensitive data without the men's permission?Luluvise describes itself as "a social network for women". It's loved by the technology media, racking up plenty of friendly articles since its launch late last...

www.fastcompany.com

With last week's reveal of Surface, Microsoft's bid for relevance in the mobile computing future, has thrown a rare spotlight on Microsoft's R&D. Turns out, there are a few recent patents with MS's name on them that suggest bold plans for mobile devices.Persona-Based Login--The Future of BYODOne criticism of the...

www.businessinsider.com

Huddle is offering new "Sync" software that's going to save you from a ton of headaches at work when you are trying to share files and work on projects remotely. Huddle is a service for sharing files across a company — so you can work on a document or...

venturebeat.com

At VentureBeat, we come across a lot of funding news every day. In order to bring you the most information possible, we’re rounding up the quick-and-dirty details about the funding deals of the day and serving them up here in our “Funding daily” column. Beamit raises seed funding Beamit, a...

www.businessinsider.com

A security researcher named Gareth Wright has uncovered an unpleasant security hole in the Android and iOS Facebook apps, reports The Next Web. A motivated hacker could copy a plain text file off of your mobile device that would grant him access to your entire account. The problem exists...

www.pcworld.com

The U.S. Federal Trade Commission should analyze Facebook's relationship with a data marketer to ensure it doesn't violate the social networking site's recently approved settlement, the Electronic Privacy Information Center said Monday. Facebook is working with Datalogix, a company based in Colorado that specializes in collecting data from retailers...

arstechnica.com

Less than 10 percent of the most popular websites offering Secure Socket Layer protection are hardened against known attacks that could allow hackers to decrypt or tamper with encrypted traffic, researchers said Thursday. The grim figure was generated by SSL Pulse, a website that monitors the effectiveness of the...

www.eweek.com

Attackers targeted executives in the defense industry and government officials with fake invitations to conferences to install the MSUpdater Trojan to steal sensitive data. - Researchers discovered malware that has been used in targeted attacks against defense contractors, government agencies and other organizations since early 2009, according to IT security...

readwrite.com

If you're like most enterprise IT professionals, you have serious concerns about cloud computing. According to a new Lieberman Software 2012 Cloud Security Survey, sponsored by the Cloud Security Alliance, 88% of the 300 IT professionals surveyed believe that some of their data hosted in the cloud could be lost, corrupted...

gigaom.com

As a world (in)famous technologist with the literal last name “Dotcom,” Kim Dotcom is a man whose swag is matched only by the damages sought against him by the U.S. government. His filesharing site Megaupload was long the ire of record companies and movie studios, who say it was a...

www.webmonkey.com

No programmer is perfect, but some mistakes are more dangerous than others. While some mistakes might just slow down your site, others can open up vulnerabilities that expose your code, your database and even your users to all manner of attack. To help you identify the more serious errors common...

www.businessinsider.com

Your iPhone is home to the sensitive data on your calendar and the contact info for your friends and family. If you use banking apps, then there's even more at risk. Why not set up a passcode to keep it all under wraps? Here's how to do it. ...

thenextweb.com

What was the most phished website during the 2012 holidays? If you thought it was a bank, you’d be pretty close; it was actually PayPal, which saw nine times more phishing sites than the next closest victim. Seriously: it was the only company that saw spoofed sites in the five...

gigaom.com

Everyone knows Facebook is full of interesting data that’s being exploited in all sorts of ways –- whether by startups building businesses on the social graph, or employers who are vetting job candidates using the site. But here’s a way in which you might not want your data mined: to...

techcrunch.com

Software and SaaS security company Cenzic is today launching a new security product for mobile application developers which will allow for the testing of mobile apps on any platform – iOS, Android, J2ME, and more. The product will be the first that can test products without requiring developers to submit...

www.guardian.co.uk

Your company's confidential information is under threat from botnets, spreading infection across the networkA botnet is a collection of connected PCs that are under the control of a remote hacker, typically through an infected PC that is then run by an external command and control system.The infected software can be...

arstechnica.com

Enlarge / Attackers behind the Red October espionage campaign used this PHP script to exploit a critical vulnerability in Oracle's Java software framework. Seculert Attackers behind a massive espionage malware campaign that went undetected for five years relied in part on a vulnerability in the widely deployed Java software...

www.insidefacebook.com

Facebook has hired the team behind Acrylic, a development studio that makes iOS and Mac software, including news reader Pulp and secure database app Wallet. The social network did not acquire Acrylic’s products or services, according to a blog post on Acrylic’s website. Acrylic says Wallet and Pulp will remain available for download and purchase...

venturebeat.com

Digital identity protector OneID has partnered with four large e-commerce platforms so more shoppers can safely and conveniently make purchases online using just one password. OneID provides customers with an account that can be used across multiple websites and payment systems. The technology authenticates user identity, while also consolidating all...

gigaom.com

CloudLock CEO Gil Zimmermann CloudLock, the Waltham, Mass.-based startup specializing in cloud security, says it’s bringing PCI compliance to Google Drive storage with a service that scans data as it flows into and out of the data repository. The growing popularity of cloud-based storage services, such as Google Drive. The...